Search

Skip to Search Results
  • 12/18/2014

    Alghamdi, Mazen

    While privacy issues in children's mobile applications are becoming increasingly sophisticated, the permissions in these applications are undergoing development without proper security implementation. Mobile applications with excessive privacy features can cause serious data leakages and other...

  • 2008-01-01

    Dari, Bashar

    Operationally Critical Threat Asset and Vulnerability Evaluation (OCTAVE) and SysTrust are two information security methodologies used to audit and review information security practices. OCTAVE is a comprehensive methodology to assess and analyze information security risks based on IT asset type....

1 - 2 of 2